[1]
T. Bhuiyan, A. Begum, S. Rahman, and I. Hadid, “API vulnerabilities: current status and dependencies”,
IJET
, vol. 7, no. 2.3, pp. 9–13, Mar. 2018,
doi: 10.14419/ijet.v7i2.3.9957.